@droner.bsky.social
researcher. exploit dev. pdx. hacking @ atredis
https://dronesec.net/
https://dronesec.net/
Reposted
Microsoft has discovered a side-channel attack (Whisper Leak) on the network communications between AI chatbots and their backend LLMs
www.microsoft.com/en-us/securi...
www.microsoft.com/en-us/securi...
November 9, 2025 at 2:38 PM
Microsoft has discovered a side-channel attack (Whisper Leak) on the network communications between AI chatbots and their backend LLMs
www.microsoft.com/en-us/securi...
www.microsoft.com/en-us/securi...
Reposted
I've officially released my real-mode emulator CPU test suite for the Intel 80386.
github.com/singlestepte...
#retrocomputing #emulation
github.com/singlestepte...
#retrocomputing #emulation
November 4, 2025 at 8:16 PM
I've officially released my real-mode emulator CPU test suite for the Intel 80386.
github.com/singlestepte...
#retrocomputing #emulation
github.com/singlestepte...
#retrocomputing #emulation
Reposted
New Blog Post: Seth Jenkins broke kASLR by doing … nothing 😩
googleprojectzero.blogspot.com/2025/11/defe...
googleprojectzero.blogspot.com/2025/11/defe...
Defeating KASLR by Doing Nothing at All
Posted by Seth Jenkins, Project Zero Introduction I've recently been researching Pixel kernel exploitation and as part of this research I ...
googleprojectzero.blogspot.com
November 3, 2025 at 6:17 PM
New Blog Post: Seth Jenkins broke kASLR by doing … nothing 😩
googleprojectzero.blogspot.com/2025/11/defe...
googleprojectzero.blogspot.com/2025/11/defe...
Reposted
[RSS] Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com ->
Original->
research.checkpoint.com ->
Original->
November 3, 2025 at 1:53 PM
[RSS] Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com ->
Original->
research.checkpoint.com ->
Original->
Reposted
Interested in Jump The Wall? Applications close Nov 7 🔥
www.districtcon.org/jtw
www.districtcon.org/jtw
October 31, 2025 at 7:52 PM
Interested in Jump The Wall? Applications close Nov 7 🔥
www.districtcon.org/jtw
www.districtcon.org/jtw
Reposted
Zimperium has discovered more than 760 Android apps that steal and relay NFC data to a remote attacker
zimperium.com/blog/tap-and...
zimperium.com/blog/tap-and...
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
NFC relay malware on Android devices is exploiting Tap-to-Pay systems, targeting financial institutions globally with sophisticated attacks and minimal user interaction.
zimperium.com
October 30, 2025 at 3:29 PM
Zimperium has discovered more than 760 Android apps that steal and relay NFC data to a remote attacker
zimperium.com/blog/tap-and...
zimperium.com/blog/tap-and...
Reposted
Sophos has linked the recent Lanscope zero-day to Bronze Butler (Tick)
news.sophos.com/en-us/2025/1...
news.sophos.com/en-us/2025/1...
BRONZE BUTLER exploits Japanese asset management software vulnerability
The threat group targeted a LANSCOPE zero-day vulnerability (CVE-2025-61932)
news.sophos.com
October 30, 2025 at 8:25 PM
Sophos has linked the recent Lanscope zero-day to Bronze Butler (Tick)
news.sophos.com/en-us/2025/1...
news.sophos.com/en-us/2025/1...
Reposted
[RSS] [Blog] A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS
code-white.com ->
Original->
code-white.com ->
Original->
October 30, 2025 at 1:39 PM
[RSS] [Blog] A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS
code-white.com ->
Original->
code-white.com ->
Original->
Reposted
Blog post about my recent CVE-2025-58726, aka “The Ghost Reflection” is out, read it here:
semperis.com/blog/exploit...
🙃
semperis.com/blog/exploit...
🙃
Exploiting Ghost SPNs and Kerberos Reflection for SMB Privilege Elevation
Understanding how attackers use Ghost Service Principal Names to initiate authentication reflection can help you avoid similar vulnerabilities.
semperis.com
October 29, 2025 at 5:19 PM
Blog post about my recent CVE-2025-58726, aka “The Ghost Reflection” is out, read it here:
semperis.com/blog/exploit...
🙃
semperis.com/blog/exploit...
🙃
Reposted
Reposted
We're officially announcing our speakers DistrictCon Year 1! Check out our incredible lineup: www.districtcon.org/speakers
This also includes our Day 1 & Day 2 Keynotes from Ian Levy and Dan Ridge.
And don't forget, GA tickets go on sale November 16! See you in January! 🪩
This also includes our Day 1 & Day 2 Keynotes from Ian Levy and Dan Ridge.
And don't forget, GA tickets go on sale November 16! See you in January! 🪩
October 27, 2025 at 4:41 PM
We're officially announcing our speakers DistrictCon Year 1! Check out our incredible lineup: www.districtcon.org/speakers
This also includes our Day 1 & Day 2 Keynotes from Ian Levy and Dan Ridge.
And don't forget, GA tickets go on sale November 16! See you in January! 🪩
This also includes our Day 1 & Day 2 Keynotes from Ian Levy and Dan Ridge.
And don't forget, GA tickets go on sale November 16! See you in January! 🪩
Reposted
CVE-2025-12220 - Busybox 1.31.1 - Multiple Known Vulnerabilities
CVE ID : CVE-2025-12220
Published : Oct. 25, 2025, 4:15 p.m. | 45 minutes ago
Description : Busybox 1.31.1 - Multiple Known Vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19....
CVE ID : CVE-2025-12220
Published : Oct. 25, 2025, 4:15 p.m. | 45 minutes ago
Description : Busybox 1.31.1 - Multiple Known Vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19....
CVE-2025-12220 - Busybox 1.31.1 - Multiple Known Vulnerabilities
Busybox 1.31.1 - Multiple Known Vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
cvefeed.io
October 25, 2025 at 5:51 PM
CVE-2025-12220 - Busybox 1.31.1 - Multiple Known Vulnerabilities
CVE ID : CVE-2025-12220
Published : Oct. 25, 2025, 4:15 p.m. | 45 minutes ago
Description : Busybox 1.31.1 - Multiple Known Vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19....
CVE ID : CVE-2025-12220
Published : Oct. 25, 2025, 4:15 p.m. | 45 minutes ago
Description : Busybox 1.31.1 - Multiple Known Vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19....
Reposted
Junkyard closes TODAY!!!!
www.districtcon.org/junkyard
www.districtcon.org/junkyard
The Junkyard — DistrictCon
www.districtcon.org
October 24, 2025 at 6:00 PM
Junkyard closes TODAY!!!!
www.districtcon.org/junkyard
www.districtcon.org/junkyard
Reposted
Reposted
The CFP for RE//verse 2026 is open, but not for long! Submissions close November 14th. Share your best RE and security research with us here: sessionize.com/reverse-2026
October 21, 2025 at 7:20 PM
The CFP for RE//verse 2026 is open, but not for long! Submissions close November 14th. Share your best RE and security research with us here: sessionize.com/reverse-2026
Reposted
The Linux kernel has patched a bug in the RDSEED entropy generator that caused AMD Zen5 chips to fail to produce random numbers.
The patch disables RDSEED and forces all AMD Zen5 processors to use RDRAND for generating random numbers.
lore.kernel.org/lkml/2025101...
The patch disables RDSEED and forces all AMD Zen5 processors to use RDRAND for generating random numbers.
lore.kernel.org/lkml/2025101...
October 19, 2025 at 2:47 PM
The Linux kernel has patched a bug in the RDSEED entropy generator that caused AMD Zen5 chips to fail to produce random numbers.
The patch disables RDSEED and forces all AMD Zen5 processors to use RDRAND for generating random numbers.
lore.kernel.org/lkml/2025101...
The patch disables RDSEED and forces all AMD Zen5 processors to use RDRAND for generating random numbers.
lore.kernel.org/lkml/2025101...
Reposted
[RSS] exploits.club Weekly Newsletter 89 - iOS GPU Driver Bugs, Kernel Stack UAFs, Hardware Wallet Auth Bypasses, and More
blog.exploits.club ->
Original->
blog.exploits.club ->
Original->
October 16, 2025 at 3:45 PM
[RSS] exploits.club Weekly Newsletter 89 - iOS GPU Driver Bugs, Kernel Stack UAFs, Hardware Wallet Auth Bypasses, and More
blog.exploits.club ->
Original->
blog.exploits.club ->
Original->
Reposted
Announcing #Pwn2Own Automotive 2026! We're heading back to Tokyo and we're adding new targets Level 3 charging thanks to #Aplitronic & the OCTT thanks to the @openchargealliance.org. Tesla is back, too. Check out the details at www.zerodayinitiative.com/blog/2025/10...
Zero Day Initiative — Pwn2Own Automotive Returns to Tokyo with Expanded Chargers and More!
If you just want to read the rules, click here . Now entering its third year, Pwn2Own Automotive returns to Automotive World in Tokyo on January 21 – 23, 2026. Over the last two years, ...
www.zerodayinitiative.com
October 16, 2025 at 3:07 PM
Announcing #Pwn2Own Automotive 2026! We're heading back to Tokyo and we're adding new targets Level 3 charging thanks to #Aplitronic & the OCTT thanks to the @openchargealliance.org. Tesla is back, too. Check out the details at www.zerodayinitiative.com/blog/2025/10...
Reposted
Talks from the REcon 2025 security conference, which took place in June, are available on YouTube
www.youtube.com/@reconmtl/vi...
www.youtube.com/@reconmtl/vi...
October 15, 2025 at 11:31 PM
Talks from the REcon 2025 security conference, which took place in June, are available on YouTube
www.youtube.com/@reconmtl/vi...
www.youtube.com/@reconmtl/vi...
Reposted
🚨 Save the Date for #offensivecon26
Mark your calendars, spread the word, and stay tuned for when registrations open!
📍 Hilton Berlin
🧠 Trainings: 11–14 May 2026
🎤 Conference: 15–16 May 2026
Visit 🔗offensivecon.org for more details.
Mark your calendars, spread the word, and stay tuned for when registrations open!
📍 Hilton Berlin
🧠 Trainings: 11–14 May 2026
🎤 Conference: 15–16 May 2026
Visit 🔗offensivecon.org for more details.
October 15, 2025 at 1:44 PM
🚨 Save the Date for #offensivecon26
Mark your calendars, spread the word, and stay tuned for when registrations open!
📍 Hilton Berlin
🧠 Trainings: 11–14 May 2026
🎤 Conference: 15–16 May 2026
Visit 🔗offensivecon.org for more details.
Mark your calendars, spread the word, and stay tuned for when registrations open!
📍 Hilton Berlin
🧠 Trainings: 11–14 May 2026
🎤 Conference: 15–16 May 2026
Visit 🔗offensivecon.org for more details.
Reposted
This one's a wild/messy one: Cyber giant F5, which serves most of the Fortune 500, said unknown government hackers had 'long term' access to its network:
• stole source code, some customer data
• accessed undisclosed vulns in BIG-IP
• DOJ allowed F5 to delay public notice citing national security
• stole source code, some customer data
• accessed undisclosed vulns in BIG-IP
• DOJ allowed F5 to delay public notice citing national security
Cyber giant F5 Networks says government hackers had 'long-term' access to its systems, stole code and customer data | TechCrunch
The company, which provides cybersecurity defenses to most of the Fortune 500, said the DOJ allowed it to delay notifying the public on national security grounds.
techcrunch.com
October 15, 2025 at 3:55 PM
This one's a wild/messy one: Cyber giant F5, which serves most of the Fortune 500, said unknown government hackers had 'long term' access to its network:
• stole source code, some customer data
• accessed undisclosed vulns in BIG-IP
• DOJ allowed F5 to delay public notice citing national security
• stole source code, some customer data
• accessed undisclosed vulns in BIG-IP
• DOJ allowed F5 to delay public notice citing national security
Reposted
eclypsium.com/research/pwn... - This is the blog version of the Ekoparty talk I did in 2022; while the Chinese APTs have developed more advanced techniques, a lot of this may still be useful as you deal with the bombshell that dropped today.
Pwned Balancers: Commandeering F5 and Citrix for Persistent Access & C2 - Eclypsium | Supply Chain Security for the Modern Enterprise
Summary The last 3 years have seen attackers turn their spotlights on initial network access through VPN concentrators, load balancers, routers, and IoT devices. Once the realm of only the most skille...
eclypsium.com
October 15, 2025 at 4:51 PM
eclypsium.com/research/pwn... - This is the blog version of the Ekoparty talk I did in 2022; while the Chinese APTs have developed more advanced techniques, a lot of this may still be useful as you deal with the bombshell that dropped today.
Reposted
It's Patch Tuesday and ASP.NET Core has a doozy, with a CVSS score of 9.9, our highest ever. Let's examine why.
The bug enables http request smuggling, which on its own for ASP.NET Core would be nowhere near that high, but that's not how we rate things...
* Thread- (1/7)
The bug enables http request smuggling, which on its own for ASP.NET Core would be nowhere near that high, but that's not how we rate things...
* Thread- (1/7)
Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulnerability · Issue #371 · dotnet/announcements
Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulnerability Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability i...
github.com
October 14, 2025 at 6:01 PM
It's Patch Tuesday and ASP.NET Core has a doozy, with a CVSS score of 9.9, our highest ever. Let's examine why.
The bug enables http request smuggling, which on its own for ASP.NET Core would be nowhere near that high, but that's not how we rate things...
* Thread- (1/7)
The bug enables http request smuggling, which on its own for ASP.NET Core would be nowhere near that high, but that's not how we rate things...
* Thread- (1/7)
Reposted
[RSS] Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers
blog.quarkslab.com ->
Original->
blog.quarkslab.com ->
Original->
October 14, 2025 at 7:40 PM
[RSS] Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers
blog.quarkslab.com ->
Original->
blog.quarkslab.com ->
Original->
Reposted
Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves
arxiv.org ->
#fromTwitter
Original->
arxiv.org ->
#fromTwitter
Original->
October 14, 2025 at 12:28 PM
Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves
arxiv.org ->
#fromTwitter
Original->
arxiv.org ->
#fromTwitter
Original->